![]() At the end of this checkpoint, you will find opportunities for continued learning about containers. Each of these sections has interactive components to help you test your knowledge. ![]() You’ll find two sections that synthesize the central ideas from the introductory articles: a brief overview of key security terminology and practices, followed by a section on using the command line with subsections related to specific security tools. This checkpoint will focus on securing your server. You can set up effective security measures for both the cloud server itself and your web applications. Securing your server is critical for protecting your users and personal information. To run a cloud application efficiently, you should implement industry recommended security practices when configuring your server. You can use this checkpoint to assess your knowledge of these topics, review key terms and commands, and find resources for continued learning. ![]() This checkpoint is intended to help you assess what you learned from our introductory articles on security, where we introduced recommended security practices and commonly used security tools. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |